mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #2755] Wiki: Sandboxing Binary Software #1729
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#1729
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @netblue30 on GitHub (Jun 10, 2019).
Original GitHub issue: https://github.com/netblue30/firejail/issues/2755
Issue for discussions about https://github.com/netblue30/firejail/wiki/Sandboxing-Binary-Software
@matu3ba commented on GitHub (Jun 21, 2019):
The description is consistent for LTS versions, but not newer versions. These are installed to
/usr/local.Maybe it would be nice to mention the user to check, if there does exist a profile yet to restrict the programs data access (for example to the default folder).
#397 could be used for further ideas.@rusty-snake commented on GitHub (Jun 22, 2019):
@matu3ba https://github.com/netblue30/firejail/issues/2748#issuecomment-504639472
@matu3ba commented on GitHub (Jul 2, 2019):
@rusty-snake Did add #2748 command to Profiles and linked there.
@matu3ba commented on GitHub (Jul 8, 2019):
Closing this?
@Mikaela commented on GitHub (Feb 9, 2020):
Would it be OK to add instructions to verify gpg signatures of applications on the page?
For example with Tor Browser it would be adding
gpg --auto-key-locate nodefault,wkd --locate-keys torbrowser@torproject.orggpg --verify tor-browser-linux64-8.5.1_en-US.tar.xz.sigWith Firefox it would be a bit more tricky digging the signature from https://releases.mozilla.org/pub/firefox/releases/ and key from https://blog.mozilla.org/security/2019/06/13/updated-firefox-gpg-key/
@rusty-snake commented on GitHub (Feb 10, 2020):
Sounds good to me.
@rusty-snake commented on GitHub (Aug 4, 2021):
https://github.com/netblue30/firejail/discussions/4449